Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for monitoring a network and network including a monitoring functionality

Inactive Publication Date: 2015-02-10
NEC CORP
View PDF24 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The present invention allows for a multi-domain exchange for pattern detection while preserving the anonymity of users being monitored. It also allows for the creation of a scalable framework for aggregation of measurement data while still supporting the possibility of retrieving more accurate after-the-fact logs. Compared to previous solutions, the present invention is more flexible in accommodating a huge amount of data while still preserving high granularity. The backtracking capability checks complete data records in case a pattern is detected. The data structures used should have a low memory footprint and query time, should avoid the occurrence of false negatives, and should be able to detect event patterns that involve variations in measurement data. The invention also allows for the triggering of a backtracking process and the checking of cached copies of the summarized data structure against the backtracking request.

Problems solved by technology

Unfortunately, monitoring traffic in real-time and in a distributed way presents a range of difficult issues.
The first of these is scalability: the volume of traffic to be monitored is rapidly growing, with reports stating that the annual global IP traffic volume will exceed half a zettabyte (5×1020 bytes) by 2012 and will nearly double every two years (see for reference “Approaching the zettabyte era”; this growth puts serious stress on any monitoring infrastructure that tries to centralize the collection of data.
Another issue is privacy, since any monitoring architecture should ensure that it can accomplish its intended purpose without infringing on end-users' privacy.
Further, several applications (e.g., law enforcement, security incident reporting, etc) have the need to backtrack to the originating monitoring probe in order to retrieve more detailed information, a requirement that could not be met by a simple scheme that exports only summarized information to achieve scalability and privacy-preservation.
While some solutions in the area exist, none of them are able to tackle all of these issues at once.
Unfortunately, this model does not scale with the growing amount of monitored data.
However, such solutions so far do not tackle the issue of inter-connecting different administrative domains (i.e., they are all single-administrative domain solutions).
Unfortunately, in order to detect certain kinds of anomalies (botnet attacks are a good example), correlation of monitoring data collected in different administrative domains is needed.
Solutions based on distributed aggregation trees (DATs) ensure scalability to the system, but, so far, they have been usually limited to monitoring of only a few aggregated performance parameters (for instance, see for reference Yalagandula, P. and Dahlin, M.
Further, they lack the flexibility needed to monitor the network behavior at a higher granularity.
In any case, they do not allow attributing anomalous behavior to single users and they do not take privacy into consideration.
Further, they do not offer support for after-the-fact auditing of the relevant logs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for monitoring a network and network including a monitoring functionality
  • Method for monitoring a network and network including a monitoring functionality
  • Method for monitoring a network and network including a monitoring functionality

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028]According to a preferred embodiment of the present invention, two complementary mechanisms are realized, which are privacy-preserving aggregation and backtracking. According to the invention probabilistic data structures are used, having the effect of achieving both mechanisms at the same time while preserving the privacy of the users being monitored.

[0029]One of the key applications of the present invention would be to support a distributed, cross-domain monitoring architecture that is scalable, protects the privacy of the monitored data, and allows for backtracking to the original monitoring probe for after-the-fact auditing by identification of the probes which have collected relevant information.

[0030]To simplify the description of the embodiments illustrated in the Figs. it is assumed that the monitoring nodes are arranged in a tree structure (although any connected graph would work). In this tree structure the leaves of the tree represent the network probes (or monitorin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for monitoring a network, wherein the network has a connected graph topology, in particular a tree structure, including a plurality of monitoring nodes that collect network measurement data, a plurality of mediator nodes each performing at least the task of aggregating network measurement data received from different monitoring nodes and / or other mediator nodes, and at least one root entity that receives network measurement data and / or aggregated network measurement data from the mediator nodes, is characterized in that the aggregation of network measurement data is performed by condensing network measurement data into a summarized probabilistic data structure. Furthermore, a network including a monitoring functionality is disclosed.

Description

CROSS-REFERENCES TO RELATED APPLICATIONS[0001]This application is a U.S. National Stage of PCT / EP2010 / 005344 filed Aug. 31, 2010 and claiming priority to EP 0901192.3 filed Sep. 1, 2009.BACKGROUND OF THE INVENTION[0002]The present invention relates to a method for monitoring a network, wherein said network has a connected graph topology, in particular a tree structure, including a plurality of monitoring nodes that collect network measurement data, a plurality of mediator nodes each performing at least the task of aggregating network measurement data received from different monitoring nodes and / or other mediator nodes, and at least one root entity that receives network measurement data and / or aggregated network measurement data from said mediator nodes.[0003]Furthermore, the present invention relates to a network including a monitoring functionality, wherein said network has a connected graph topology, in particular a tree structure, including a plurality of monitoring nodes that co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G01R31/08G06F11/00G08C15/00H04J1/16H04J3/14H04L1/00H04L12/26H04L12/28H04L12/24H04L29/06
CPCH04L43/02H04L63/1425H04L41/16H04W24/08
Inventor DI PIETRO, ANDREAHUICI, FELIPECOSTANTINI, DIEGONICCOLINI, SAVERIO
Owner NEC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products